$ page 21/40

‘CanisterWorm’ springs a destructive wiper attack targeting Iran

A new destructive worm, CanisterWorm, is targeting Iran by spreading through insecure cloud services and wiping data, marking a dangerous new trend.

6 min readApr 2

OpenAI expands bug bounty to cover AI abuse and 'safety' concerns

OpenAI's bug bounty program now rewards researchers for finding AI safety vulnerabilities, shifting focus from traditional code flaws to complex issue

6 min readApr 2

SANS report: The top 5 most dangerous new attack techniques are all powered by AI

For the first time, the SANS Institute's top five most dangerous attack techniques all have one thing in common: the weaponization of Artificial Intel

6 min readApr 2

Chinese hackers caught deep within telecom backbone infrastructure

A Chinese state-sponsored actor named Unfading Sea Haze has compromised telecom backbones using advanced kernel implants for long-term espionage.

5 min readApr 2

Intermediaries driving global spyware market expansion

Third-party resellers and brokers foil transparency efforts and allow spyware to spread despite government restrictions, a new study finds.

6 min readApr 2

Iranian state hackers breached former official Kash Patel's email, FBI confirms

The FBI confirmed Iranian state-sponsored hackers compromised the personal email of former Trump official Kash Patel, part of a 2020 election interfer

6 min readApr 2

FCC bans new foreign-made routers, citing supply chain and cyber risks

In a major escalation of its supply chain security strategy, the FCC has banned the import and sale of new, foreign-made consumer routers to mitigate

6 min readApr 2

Security researchers sound the alarm on vulnerabilities in AI-generated code

A Georgia Tech study reveals over 100 CVEs linked to AI coding tools like GitHub Copilot, introducing a new vector for software vulnerabilities.

6 min readApr 2

Poland's critical infrastructure under siege: Analyzing the surge in state-sponsored cyberattacks

As a key NATO ally, Poland faces an escalating wave of Russian-sponsored cyberattacks targeting its critical infrastructure, from railways to the ener

6 min readApr 1

Enterprise cybersecurity software fails 20% of the time, warns Absolute Security

A new report finds 20% of enterprise security tools are failing due to poor patch management and IT complexity, leaving organizations dangerously expo

6 min readApr 1

The FCC's router ban: A necessary security measure or the wrong fix?

The FCC put foreign-made consumer routers on its prohibited list to protect national security, but critics argue the ban creates a false sense of secu

6 min readApr 1

Trivy hack spreads infostealer via Docker, triggers worm and Kubernetes wiper

A hypothetical supply chain attack on the Trivy security scanner via Docker Hub highlights a severe threat involving an infostealer, worm, and a Kuber

6 min readApr 1